Secure Systems Research Group - FAU
A SECURITY REFERENCE ARCHITECTURE FOR CLOUD SYSTEMS
Eduardo B. Fernandez
- Dept. of Computer Science and Engineering
Florida Atlantic University Boca Raton, FL, USA http://www.cse.fau.edu/~ed ed@cse.fau.edu
A SECURITY REFERENCE ARCHITECTURE FOR CLOUD SYSTEMS Eduardo B. - - PowerPoint PPT Presentation
A SECURITY REFERENCE ARCHITECTURE FOR CLOUD SYSTEMS Eduardo B. Fernandez Dept. of Computer Science and Engineering Florida Atlantic University Boca Raton, FL, USA http://www.cse.fau.edu/~ed ed@cse.fau.edu Secure Systems Research Group - FAU
Secure Systems Research Group - FAU
Florida Atlantic University Boca Raton, FL, USA http://www.cse.fau.edu/~ed ed@cse.fau.edu
Secure Systems Research Group - FAU
Secure Systems Research Group - FAU
Secure Systems Research Group - FAU
Secure Systems Research Group - FAU
Secure Systems Research Group - FAU
Secure Systems Research Group - FAU
Secure Systems Research Group - FAU
Secure Systems Research Group - FAU
Secure Systems Research Group - FAU
Secure Systems Research Group - FAU 8/9/13 11
UML/OCL models Security patterns Model checking and composability
Vulnerability analysis Code examination Best practices Theoretical Analysis of Security Model-driven Security Code-based Security Certification Certification Verification
Secure Systems Research Group - FAU
8/9/13
Secure Systems Research Group - FAU
8/9/13
Secure Systems Research Group - FAU
Secure Systems Research Group - FAU
Secure Systems Research Group - FAU
Secure Systems Research Group - FAU
Secure Systems Research Group - FAU
address address PFFirewall ExplicitRule DefaultRule ExternalHost LocalHost Rule in/out {ordered} * 1 1 1 * * requestService requestService RuleBase addRule deleteRule modifyRule reorderRules
Secure Systems Research Group - FAU
«actor» :ExtHost :Firewall :RuleBase :Rule :LocalHost requestService( ) requestService( ) accept accept checkRule requestService( )
Secure Systems Research Group - FAU
Secure Systems Research Group - FAU
Secure Systems Research Group - FAU
Secure Systems Research Group - FAU
Secure Systems Research Group - FAU
User id name ProtectionObject id name * * Authorization_rule
Right
access_type predicate copy_flag checkRights Role id name * * MemberOf
Secure Systems Research Group - FAU
Session-based RBAC Basic Authorization
authorizer
Session-based ABAC Delegatable Authorization Basic RBAC Content-based Authorization Explicitly Granted Authorization ABAC
s =Role s or o =attribute values
session condition session CopyFlag
Access Session
session session
Secure Systems Research Group - FAU
calls and responses to/from enterprise applications, based
enterprise applications, based on business access control policies and the content of the message.
represent authorization rules in a standard manner.
decides if a request is authorized to access a resource according to policies defined by the XACML Authorization
control policies for its web services in a standard manner. It also enables a web services consumer to express its requirements in a standard manner.
Secure Systems Research Group - FAU
WS1 WS2 Registry
P AYLOAD H EADE R. . . . . .
Transports HTTP D ocument Storage
Web Services Business Workflow C atalog and Description C omm unicatio ns
D BMS SSL OS TCP/IP
file system memory processes BPEL4WS WSCI UDDI ebXML WSDL SOA P XML X ML
Standards Security Standards/ Specificatio ns
ebXML sec WSPL WS-Security
XML Signature XKMS Encr yption SAM L X ACML WS-Policy WS-Authorization UD DI security WS-Trust WS-Federation WS-SecureC onversation
SOAP XML
Web services lay ers Supporting structures
SAML WS-Privacy
Secure Systems Research Group - FAU 8/9/13 28
Secure Systems Research Group - FAU 8/9/13 29
Secure Systems Research Group - FAU
Secure Systems Research Group - FAU
+policyCombiningAlgorithm() PolicySet +ruleCombiningAlgorithm() Policy
Rule 1 Target
Resource
Subject Action
Environment * * * * +addRule() +deleteRule() +updateRule() +createPolicy() +deletePolicy() +createPolicySet() +deletePolicySet() PolicyAdministrationPoint 1 *
PolicyComponent 1..* * * 1
Secure Systems Research Group - FAU
PolicyAdministrationPoint +retrieveApplicablePolicy() +evaluateApplicablePolicy()
PolicyDecisionPoint PolicyEnforcementPoint evaluates PolicyComponent ApplicablePolicySet ContextHandler 1 * correspondsTo +getAttributeValue() PolicyInformationPoint
Subject
Resource 1 * 1 1 *
XACMLAccessResponse * * 1 1 correspondsTo * * <<creates>> requestsAccess
XACMLAccessRequest * * isAuthorizedFor correspondsTo
Secure Systems Research Group - FAU
Secure Systems Research Group - FAU
Secure Systems Research Group - FAU
Secure Systems Research Group - FAU
Secure Systems Research Group - FAU
Security verification and testing Requirements Analysis Design Implementation
Secure UCs Authorization rules in conceptual model Rule enforcement through architecture Language enforcement
Security test cases
Secure Systems Research Group - FAU
Secure Systems Research Group - FAU
Secure Systems Research Group - FAU
Secure Systems Research Group - FAU
Secure Systems Research Group - FAU
Open Account Close Account Customer Perform trade Receive Trade Order Manager Check Trade Info Auditor Broker
UC1 UC2 UC3 UC4 UC5
Secure Systems Research Group - FAU
Check Credit Provide Personal Info Customer Manager Create Account Create Authorization Initial deposit :Card1 :Customer Account1: Create Authorization
Secure Systems Research Group - FAU
Provide Personal Info Check Credit Create Account Initial Deposit Create Authorization Issue Card Disseminate Info Illegally Issue Spurious Card Transfer Money Account1: :Customer Account2: Account3: Card1: Card2: Create Spurious Account Imposter Imposter False info Customer Manager External Attacker Provide Personal Info Check Credit Create Account Initial Deposit Create Authorization Issue Card Disseminate Info Illegally Issue Spurious Card Transfer Money Account1: :Customer Account2: Account3: Card1: Card2: Create Spurious Account Imposter Imposter False info Customer Manager External Attacker
Secure Systems Research Group - FAU
name of another person
spurious account
information
the account
accounts
account
Secure Systems Research Group - FAU
Secure Systems Research Group - FAU
nodes is authenticated.
can only log his actions for auditing at a later time.
example, a manager can create accounts but should have no rights to withdraw or deposit in the account.
redundancy in the system to increase its availability.
not be able to move money from any account. Policies can be realized with patterns
Secure Systems Research Group - FAU
Right accessType deposit, withdraw, trade AcctUserRole OwnerRole creditInfo Account balance
close trade Transaction deposit withdraw trade Right accessType Customer id 1 * * * * *
close
Secure Systems Research Group - FAU
Secure Systems Research Group - FAU
Secure Systems Research Group - FAU
Secure Systems Research Group - FAU
Secure Systems Research Group - FAU
environments where we enumerated the main cloud threats, vulnerabilities , and possible defenses found in the literature
patterns: – Resource Usage Monitoring Inference – Malicious Virtual Machine Creation – Malicious Virtual Machine Migration.
security patterns to add security defenses and misuse patterns to evaluate its security level. – Developed a pattern for a secure virtual machine repository system
Secure Systems Research Group - FAU
Secure Systems Research Group - FAU
Secure Systems Research Group - FAU
Vulnerabilities in Cloud Computing
Secure Systems Research Group - FAU
Secure Systems Research Group - FAU
Relationships between Threats, Vulnerabilities, and Countermeasures
Secure Systems Research Group - FAU
Secure Systems Research Group - FAU
Cloud Architecture Overview
Secure Systems Research Group - FAU
Use Cases Common Use Cases for Cloud Computing
Secure Systems Research Group - FAU
Secure Systems Research Group - FAU
Misuse Activity Actor Actio n #
CO/IN/AV/ AC Source AIn/UIn/Out
Description Ass et Cloud Consum er Creat e VMI T1 IN Out Insert malicious code in the image VM I Cloud Consum er Send VMI T2 CO Out VMI may be read while being transmitted VM I T3 IN Out VMI may be modified while in transit VM I T4 AC Out Disavows sending a VMI VM I IaaS Administ rator Recei ve VMI T5 CO AIn/UIn Collects sensitive information from VMI VM I T6 AV AIn Disavows receiving a VMI VM I T7 IN UIn/AIn Insert malicious code in the image VM I
Secure Systems Research Group - FAU
ID Threats Defense T 1 The cloud customer is an impostor and publishes a VMI A u t h e n t i c a t o r - Authorization T 2 The cloud consumer inserts malicious code within a VMI Filter module T 3 An external attacker listens to the network to obtain information about the VMI Secure network T 4 The IaaS administrator is an impostor and collects information within the VMI A u t h e n t i c a t o r - Authorization T 5 The IaaS administrator creates a malicious VMI Filter module T 6 T 7
Secure Systems Research Group - FAU
Class Diagram for Infrastructure- as-a-Service architecture
Secure Systems Research Group - FAU
Sequence Diagram for Use Case Create a Virtual Machine
Secure Systems Research Group - FAU
Class Diagram for a Cloud Computing Environment
Secure Systems Research Group - FAU
Secure Systems Research Group - FAU
Securing a cloud reference architecture
Secure Systems Research Group - FAU
Secure Systems Research Group - FAU
Secure Systems Research Group - FAU
Secure Systems Research Group - FAU
Secure Systems Research Group - FAU
Secure Systems Research Group - FAU
"Securing Distributed Systems using Patterns: A Survey", Computers & Security, 2012 http://dx.doi.org/10.1016/j.cose.2012.04.005
Hashizume, K.; Larrondo-Petrie, M.M. A Survey of Patterns for Web Services Security and Reliability Standards. Future Internet 2012, 4, 430-450. http://www.mdpi.com/ 1999-5903/4/2/430/
multidimensional classification for users of security patterns", Journal of Research and Practice in Information Technology, vol. 41, No 2, May 2009, 87-97
Secure Systems Research Group - FAU
Analysis of Security issues for Cloud Computing,” accepted for the Journal of Internet Computing.
Patterns,” in 19th Conference on Pattern Languages of Programs, 2012.
as-a-Service in Clouds,” in Workshop on Redefining and Integrating Security Engineering (RISE’12), Washington, DC, USA, 2012.
Pattern,” in First International Symposium on Software Architecture and Patterns, in conjunction with the 10th Latin American and Caribbean Conference for Engineering and Technology, Panama, 2012.
Computing,” in Security Engineering for Cloud Computing: Approaches and Tools, D.
Computing", Procs. of Asian PLoP 2011.
for cloud computing: Malicious virtual machine creation"", Procs. of the Twenty-Third International Conference on Software Engineering and Knowledge Engineering (SEKE 2011), Miami Beach, USA, July 7-9, 2011, (Acceptance rate: 31%)